Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
From MaRDI portal
Publication:2822680
DOI10.1007/978-3-319-39555-5_19zbMath1346.68094OpenAlexW2489890856MaRDI QIDQ2822680
Niels de Vreede, Meilof Veeningen, Berry Schoenmakers
Publication date: 4 October 2016
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://zenodo.org/record/60294
Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Cryptography (94A60)
Related Items (3)
Function-Dependent Commitments for Verifiable Multi-party Computation ⋮ Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation ⋮ Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
Uses Software
Cites Work
- Security and composition of multiparty cryptographic protocols
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
- Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
- Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
- SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
- Publicly Auditable Secure Multi-Party Computation
- Cluster Computing in Zero Knowledge
- Short Pairing-Based Non-interactive Zero-Knowledge Arguments
- Revocation in Publicly Verifiable Outsourced Computation
- A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
- Efficient Binary Conversion for Paillier Encrypted Values
- Multi-Client Non-interactive Verifiable Computation
- Quadratic Span Programs and Succinct NIZKs without PCPs
- Multi-Client Verifiable Computation with Stronger Security Guarantees
- Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing
- Reusable garbled circuits and succinct functional encryption
- Theory of Cryptography
- Public Key Cryptography - PKC 2006
This page was built for publication: Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation